Please find the attachment Things to consider What assets are you protecting? Where is it stored? Local Central Cloud What communication processes are used? Email, Social media Web based What accesses your network? Automated devices IoT Artificial Intelligence BYOD Who are your users? Include in summary Provide specific Examples of what has happened in the banking industry or research hospitals What happened? What solutions were implemented? What worked? What didn’t work? ...